Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-1356: CWE-918 Server-Side Request Forgery (SSRF) in mateuszgbiorczyk Converter for Media – Optimize images | Convert WebP & AVIF

0
Medium
VulnerabilityCVE-2026-1356cvecve-2026-1356cwe-918
Published: Thu Feb 12 2026 (02/12/2026, 09:25:49 UTC)
Source: CVE Database V5
Vendor/Project: mateuszgbiorczyk
Product: Converter for Media – Optimize images | Convert WebP & AVIF

Description

CVE-2026-1356 is a Server-Side Request Forgery (SSRF) vulnerability in the WordPress plugin 'Converter for Media – Optimize images | Convert WebP & AVIF' affecting all versions up to 6. 5. 1. The flaw exists in the PassthruLoader::load_image_source function, allowing unauthenticated attackers to make arbitrary web requests from the server hosting the plugin. This can lead to unauthorized querying and modification of internal services accessible from the vulnerable server. The vulnerability has a medium severity with a CVSS score of 4. 8, indicating limited confidentiality and integrity impact but no availability impact. No known exploits are currently reported in the wild. European organizations using this plugin on WordPress sites are at risk, especially those with internal services exposed to the hosting environment. Mitigation involves updating the plugin once a patch is available or applying strict network-level controls to prevent unauthorized outbound requests from the web server.

AI-Powered Analysis

AILast updated: 02/12/2026, 09:48:31 UTC

Technical Analysis

CVE-2026-1356 is a Server-Side Request Forgery (SSRF) vulnerability identified in the WordPress plugin 'Converter for Media – Optimize images | Convert WebP & AVIF' developed by mateuszgbiorczyk. The vulnerability resides in the PassthruLoader::load_image_source function, which improperly handles user-supplied input to fetch image resources. This flaw allows unauthenticated attackers to craft requests that the server will execute, effectively making the server perform arbitrary HTTP requests to internal or external systems. SSRF vulnerabilities are dangerous because they can be used to bypass firewall restrictions, access internal-only services, or manipulate internal APIs that are not exposed externally. In this case, the attacker can potentially query sensitive internal endpoints or modify information if internal services accept such requests. The vulnerability affects all plugin versions up to and including 6.5.1. The CVSS v3.1 base score is 4.8, reflecting network attack vector, high attack complexity, no privileges required, no user interaction, and limited confidentiality and integrity impact but no availability impact. No public exploits have been reported yet, but the vulnerability is publicly disclosed and should be treated seriously. The plugin is widely used in WordPress environments for image optimization and conversion, making the attack surface significant. The lack of a patch at the time of disclosure means organizations must rely on compensating controls until an update is released.

Potential Impact

For European organizations, this SSRF vulnerability could lead to unauthorized access to internal services that are otherwise protected by network segmentation or firewalls, potentially exposing sensitive data or enabling further lateral movement within the network. Since the vulnerability allows unauthenticated attackers to initiate requests from the web server, it could be exploited to scan internal networks, access metadata services in cloud environments, or interact with internal APIs that control critical functions. This could compromise confidentiality and integrity of internal systems. Although the CVSS score is medium, the actual impact depends on the internal architecture and the sensitivity of services accessible from the web server. Organizations relying heavily on WordPress with this plugin installed on public-facing sites are at increased risk. The vulnerability does not directly impact availability but could be a stepping stone for more complex attacks. European entities in sectors such as finance, healthcare, and government, which often have strict data protection requirements, could face regulatory and reputational damage if internal data is exposed or altered.

Mitigation Recommendations

1. Monitor for plugin updates and apply patches immediately once available to remediate the vulnerability. 2. Until a patch is released, disable or remove the vulnerable plugin from WordPress installations to eliminate the attack vector. 3. Implement strict egress filtering on web servers hosting WordPress to restrict outbound HTTP requests only to trusted destinations, preventing SSRF exploitation. 4. Use Web Application Firewalls (WAFs) with rules designed to detect and block SSRF attack patterns targeting the plugin’s endpoints. 5. Conduct internal network segmentation to minimize the exposure of sensitive internal services to the web server. 6. Audit and monitor logs for unusual outbound requests originating from the web server to detect potential exploitation attempts. 7. Employ security plugins or tools that can detect anomalous behavior in WordPress environments. 8. Educate administrators about the risks of SSRF and the importance of timely patching and network controls.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
Wordfence
Date Reserved
2026-01-22T19:44:35.120Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 698d9e94c9e1ff5ad8b36380

Added to database: 2/12/2026, 9:34:12 AM

Last enriched: 2/12/2026, 9:48:31 AM

Last updated: 2/12/2026, 1:12:10 PM

Views: 157

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats